{"id":65595,"date":"2019-11-25T12:36:57","date_gmt":"2019-11-25T10:36:57","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/?p=65595"},"modified":"2021-06-02T15:28:28","modified_gmt":"2021-06-02T13:28:28","slug":"the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/","title":{"rendered":"The race is on to protect trains, planes, and ships from devastating cyber-attacks"},"content":{"rendered":"<ul class=\"bold-list\">\n<li>An Israeli cybersecurity startup develops software that aims to protect trains from hackers<\/li>\n<li>Cybersecurity risks in the aviation industry<\/li>\n<li>How to protect ships from hackers<\/li>\n<li>Enhancing cybersecurity in the transportation sector<\/li>\n<\/ul>\n<p>Technology has had a transformative impact on almost every industry in recent years, so it\u2019s not surprising that the same thing is happening to the <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/from-3d-printed-motorbikes-to-cars-faster-than-lambos-the-future-of-transportation-is-electric\/\">transportation<\/a> sector as well. The adoption of new technologies has significantly increased safety, reliability, and operational efficiency within the sector. It\u2019s also improved the passenger experience by providing unparalleled comfort and convenience.<\/p>\n<figure id=\"attachment_66999\" aria-describedby=\"caption-attachment-66999\" style=\"width: 400px\" class=\"wp-caption alignright\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-66999\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/11\/emphesis-1-300x134.png\" alt=\"An infographic showing the percentage of cyber-attacks directed at the transportation sector.\" width=\"400\" height=\"179\" srcset=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-1-300x134.png 300w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-1-768x343.png 768w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-1-1024x458.png 1024w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-66999\" class=\"wp-caption-text\">According to a recent cybersecurity report published by IBM, in 2018, transportation was the second most targeted sector for cyber criminals, experiencing around 13 per cent of total cyber-attacks.<\/figcaption><\/figure>\n<p>However, increased connectivity also introduced new security problems that have made the transportation sector more vulnerable to cyber-attacks. In fact, a recent cybersecurity report published by IBM <a href=\"https:\/\/xforceintelligenceindex.mybluemix.net\/documents\/IBM-X-ForceThreat-Intelligence-Index-2019.pdf\">reveals<\/a> that transportation was the second most targeted sector in 2018, experiencing approximately 13 per cent of total cyber-attacks.<\/p>\n<h2>An Israeli cybersecurity startup develops software that aims to protect trains from hackers<\/h2>\n<p>Railway networks are especially vulnerable to hacking, as they typically combine modern technological components with archaic physical ones, which weren\u2019t designed with cybersecurity in mind. \u201cRail travel has undergone a digitization process that may be lagging behind other industries,\u201d <a href=\"https:\/\/www.cnbc.com\/2019\/11\/12\/israeli-cybersecurity-startups-plan-to-keep-trains-safe-from-hackers.html\">explains<\/a> Amir Levintal, the former director of the Israel Defense Forces\u2019 cyber research and development unit and the CEO of the cybersecurity firm Cylus. \u201cTrain companies also use safety systems meant to last 30 years or more, which means many of these have been put in place long before contemporary hacking tools were available or threats known.\u201d<\/p>\n<p>For example, today\u2019s command centres often use wireless signals to control various activities throughout the network, including monitoring train speeds and regulating traffic signals. However, these wireless signals also expose the network to cyber-attacks. \u201cSome train networks use Wi-Fi connections to control critical components of the train, like brakes and doors. Attackers can find ways to access the wireless network to send commands to those components and change the behavior of the train,\u201d <a href=\"https:\/\/www.businessinsider.com\/cyber-attacks-targeting-railway-systems-next-2018-5\">adds<\/a> Levintal. \u201cOnce attackers succeed in breaching a network to gather information, they can attack the physical elements of the network.\u201d Gaining access to the network allows hackers to execute all kinds of commands, including derailing the train.<\/p>\n<p>In February 2018, a man named Christopher Victor Grupe was <a href=\"https:\/\/www.theregister.co.uk\/2018\/02\/14\/rogue_it_admin_canadian_railway_switches\/\">sentenced<\/a> to one year in prison for sabotaging a railroad company\u2019s computer network. A former IT administrator at the Canadian Pacific Railway (CPR), Grupe was suspended for insubordination in December 2015 and then informed he would be fired. However, he managed to convince the company to let him resign instead, promising to return his laptop, remote access authentication token, and access badges. Grupe did as promised, but before leaving the company, he used his login credentials to access the company\u2019s computer network switches and proceeded to remove some admin accounts, changed passwords for other accounts, and delete certain key files. He then destroyed the logs in an attempt to cover his tracks and finally returned the laptop. It took nearly a month for the company to discover the sabotage. When they tried to log into the switches, they found out they were locked out and had to force reboot all of the devices to regain access. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/it-admin-trashes-railroad-companys-network-before-he-leaves\/\">According to<\/a> the company, Grupe caused approximately $30,000 worth of damage.<\/p>\n<p>Finding a way to protect the physical components is paramount to preventing future attacks. \u201cWe must converge old and new technologies and close a complicated security gap,\u201d <a href=\"https:\/\/www.businessinsider.com\/cyber-attacks-targeting-railway-systems-next-2018-5\">says<\/a> Levintal. \u201cWe can no longer think that attacks like these won&#8217;t happen in the future. Rail networks are huge, complex and connected. It&#8217;s easier than ever to find ways to get into the systems.\u201d Cylus has developed cybersecurity solution called CylusOne that aims to address two main vulnerabilities in the railway industry by monitoring signaling and control networks, including trackside devices, interlocking, and management workstations, and securing onboard operational and passenger comfort systems. In addition to being able to detect cyber-threats before any damage is done, the software can also determine the severity of the threat and offer suggestions on how to respond.<\/p>\n<p><iframe title=\"Cyber security for safety-critical networks in rail\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/8feDjCX1rI0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>Cybersecurity risks in the aviation industry<\/h2>\n<p>The <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/can-jet-fuel-made-from-recycled-waste-revolutionise-the-aviation-industry\/\">aviation industry<\/a> isn\u2019t immune to cyber-threats either. In the past, airplanes used to rely on aviation-specific technologies and kept most of their systems isolated, which made them rather safe from cyber criminals. However, that\u2019s changed in recent years with the adoption of new technologies. In an attempt to satisfy changing market demands and remain competitive, the aviation sector is becoming increasingly dependent on software-driven systems, internet connectivity, and digital data. While these innovations have resulted in an improved flight experience for passengers, they\u2019ve also increased the attack surface and made airplanes more vulnerable to hacking. Today\u2019s modern aircraft are complex and highly connected systems that feature a number of elements that are vulnerable to attacks, including in-flight entertainment and connectivity systems, electronic flight bags, cabin crew devices, digital ground and onboard systems, and air traffic management systems.<\/p>\n<p>Yet, despite the increased threat of cyber-attacks, a large number of companies operating in the sector still don\u2019t have a system in place to manage those risks. A 2016 survey conducted by PwC <a href=\"https:\/\/www.blackstratus.com\/risks-of-cybersecurity-within-aviation\/\">reveals<\/a> that only 40 per cent of aerospace companies had a comprehensive security strategy. This can sometimes have serious consequences. In 2018, the Hong Kong-based Cathay Pacific Airways <a href=\"https:\/\/fortune.com\/2018\/10\/25\/cathay-pacific-biggest-airline-data-breach-hack\/\">experienced<\/a> the biggest data breach in the history of the aviation sector. A hacker was able to gain access to the personal information of 9.4 million customers, including their names, dates of birth, nationalities, email, telephone numbers, physical addresses, ID cards, passport numbers, credit card numbers, and historical travel information. Even though flight safety wasn\u2019t compromised, the data breach resulted in the airline\u2019s shares falling to the lowest level in nine years and losing as much as $361 million in market value.<\/p>\n<figure id=\"attachment_67001\" aria-describedby=\"caption-attachment-67001\" style=\"width: 400px\" class=\"wp-caption alignright\"><img decoding=\"async\" class=\"wp-image-67001\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/11\/emphesis-2-300x146.png\" alt=\"An infographic showing the percentage of aerospace companies that had a comprehensive security strategy in 2016.\" width=\"400\" height=\"195\" srcset=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-2-300x146.png 300w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-2-768x374.png 768w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/emphesis-2-1024x498.png 1024w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-67001\" class=\"wp-caption-text\">According to a 2016 survey conducted by PwC, only 40 per cent of aerospace companies had a comprehensive security strategy.<\/figcaption><\/figure>\n<p>However, it\u2019s not just passenger data that\u2019s at risk. In September 2018, the security researcher Ruben Santamarta <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/08\/a-boeing-code-leak-exposes-security-flaws-deep-in-a-787s-guts\/?comments=1\">discovered<\/a> an unprotected server on Boeing&#8217;s network that contained code designed to run on the company\u2019s 737 and 787 passenger jets. After examining the code, Santamarta also discovered security flaws in one of the 787 Dreamliner&#8217;s components that could potentially allow a hacker to infiltrate the plane\u2019s in-flight entertainment system. From there, they could exploit memory corruption vulnerabilities in the Crew Information Service\/Maintenance System (CIS\/MS) to gain access to critical systems like flight controls and sensors. Boeing has since rejected the possibility of such an attack, claiming that there are additional protection mechanisms in place to prevent these bugs from being exploited. While most security researchers agree that this is far from an immediate threat, the fact that such vulnerabilities exist at all should be a cause for concern. \u201cThe claim that one shouldn&#8217;t worry about a vulnerability because other protections prevent it from being exploited has a very bad history in computer security,\u201d <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/08\/a-boeing-code-leak-exposes-security-flaws-deep-in-a-787s-guts\/?comments=1\">says<\/a> Stefan Savage, a computer science professor at the University of California at San Diego.<\/p>\n<p>The global cybersecurity provider F-Secure has <a href=\"https:\/\/press.f-secure.com\/2018\/03\/15\/f-secures-aviation-cyber-security-services-takes-off\/\">developed<\/a> Aviation Cyber Security Services, a new product designed to help aviation companies protect their aircraft, infrastructure, and data from cyber-attacks. The software incorporates security assessments of avionics, ground systems, and data links, security monitoring, vulnerability scanners, incident response services, and specialised cybersecurity trainings for IT managers, as well as cabin and cockpit crews. \u201cA key issue we help organizations with is how to protect an aircraft\u2019s safety-critical systems from compromises in systems that are, in a sense, more exposed but less significant to an airplane\u2019s operations,\u201d <a href=\"https:\/\/press.f-secure.com\/2018\/03\/15\/f-secures-aviation-cyber-security-services-takes-off\/\">says<\/a> Andrea Barisani, F-Secure\u2019s head of hardware security. \u201cA key protection measure is separating systems into different \u2018trust domains\u2019, and then controlling how systems in different domains can interact with one another. This prevents security issues in one domain, like a Wi-Fi service accessible to passengers, from affecting safety-critical systems, like aircraft controls or air to ground datalinks.\u201d<\/p>\n<h2>How to protect ships from hackers<\/h2>\n<p>Just like trains and planes, ships have also become increasingly connected in recent years, making them more vulnerable to cyber-attacks. However, given the complexity of the maritime industry, addressing this issue is anything but simple. One of the main reasons is that there are many different classes of vessels that run on different operating systems, many of which are outdated and no longer supported. Another issue is that ship crews are changing all the time and new members are often not familiar with the systems they\u2019re supposed to use, which increases the chances of human error. Last but not least, ships are in constant communication with their parent companies\u2019 terrestrial systems, making them vulnerable to security flaws in land-based infrastructure as well.<\/p>\n<p>Pen Test Partners, a UK-based company that offers penetration testing, security assessment, and training services, recently <a href=\"https:\/\/threatpost.com\/hacker-capsize-ship-sea\/142077\/\">revealed<\/a> that it would be relatively easy to capsize a ship by exploiting vulnerabilities in critical ship control systems, such as IP-to-serial converters, GPS receivers, or the Voyage Data Recorder (VDR). Many of these devices still run on Windows XP or Windows NT, have outdated firmware, and use default admin passwords, which are easily exploited. These devices use a standardised messaging system called NMEA 0183 messaging to communicate with the ship\u2019s various control systems, including autopilot systems, dynamic positioning, engine control, propulsion control, ballast control, and digital compasses. By gaining access to these systems, an attacker could cause serious damage to the ship. For example, a small change in the ship\u2019s ballast control systems could potentially cause it to capsize during a tight turn. \u201cModern ballast control systems provide remote monitoring and operation from the bridge, usually running on a PC,\u201d <a href=\"https:\/\/threatpost.com\/hacker-capsize-ship-sea\/142077\/\">explains<\/a> the Pen Test Partners researcher Ken Munro. \u201cSo, the attacker would simply send the appropriate serial data to the ballast pump controllers, causing them all to pump from port to starboard ballast tanks. That change in trim alone could cause a capsize.\u201d<\/p>\n<p>The maritime industry has been rather slow to react to this growing threat. In 2016, the International Maritime Organization (IMO), the UN body responsible for regulating maritime space, issued its interim cybersecurity risk management guidelines for the maritime industry. The IMO <a href=\"https:\/\/www.rivieramm.com\/news-content-hub\/imo-imposes-cyber-security-on-ship-ism-41090\">updated<\/a> the guidelines in 2017 to provide more clarification on how the industry should conduct risk management processes. According to the new rules, shipowners and managers have until January 2021 to incorporate cyber risk management and security into their safety management systems or risk having their ships detained. While the new guidelines represent an important step, many experts are already calling them outdated, as they don\u2019t even mention the cloud or artificial intelligence technology. \u201cThey don\u2019t address the modern cybersecurity exposures created by mobility, applications and the cloud,\u201d <a href=\"https:\/\/www.wsj.com\/articles\/maritime-cyber-rules-coming-in-2021-are-outdated-critics-say-11563442201\">says<\/a> Tom Kellermann, the chief cybersecurity officer at the security firm Carbon Black Inc.<\/p>\n<h2>Enhancing cybersecurity in the transportation sector<\/h2>\n<p>Like many other industries before it, the transportation sector is currently undergoing a major tech-driven transformation. While the proliferation of new technologies within the sector has brought numerous advantages, such as improved safety, efficiency, reliability, and passenger experience, it\u2019s also made trains, planes, and ships more vulnerable to devastating cyber-attacks. The sector has generally failed to respond adequately to this growing threat. However, that\u2019s slowly starting to change as security researchers continue to discover new, more serious vulnerabilities that could potentially even endanger the lives of passengers. While none of the cyber-attacks on the transportation sector have caused loss of human life so far, the fact that this possibility exists, even if only in theory, has forced the sector to recognise the gravity of the issue and take steps to address it by implementing cybersecurity solutions designed specifically for this sector.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An Israeli cybersecurity startup develops software that aims to protect trains from hackers Cybersecurity risks in the aviation industry How to protect ships from hackers Enhancing cybersecurity in the transportation sector Technology has had a transformative impact on almost every industry in recent years, so it\u2019s not surprising that the same thing is happening to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":65597,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[5095,4585,4241],"article-type":[],"trends":[],"class_list":["post-65595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-aviation-industry","tag-cybersecurity-en-2","tag-ships"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &amp;#x2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &amp;#x2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-25T10:36:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-02T13:28:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Richard van Hooijdonk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rvhooijdonk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Richard van Hooijdonk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/\"},\"author\":{\"name\":\"Richard van Hooijdonk\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/857ccc53beb99d16a67dd4142cc93695\"},\"headline\":\"The race is on to protect trains, planes, and ships from devastating cyber-attacks\",\"datePublished\":\"2019-11-25T10:36:57+00:00\",\"dateModified\":\"2021-06-02T13:28:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/\"},\"wordCount\":1999,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Transportation-cyber-security.jpg\",\"keywords\":[\"aviation industry\",\"cybersecurity\",\"ships\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/\",\"name\":\"The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Transportation-cyber-security.jpg\",\"datePublished\":\"2019-11-25T10:36:57+00:00\",\"dateModified\":\"2021-06-02T13:28:28+00:00\",\"description\":\"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &#x2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Transportation-cyber-security.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Transportation-cyber-security.jpg\",\"width\":800,\"height\":526,\"caption\":\"A person wearing a hoodie with their face hidden and holding a laptop surrounded by airplane icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The race is on to protect trains, planes, and ships from devastating cyber-attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/857ccc53beb99d16a67dd4142cc93695\",\"name\":\"Richard van Hooijdonk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g\",\"caption\":\"Richard van Hooijdonk\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rvhooijdonk\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog","description":"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &#x2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog","og_description":"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &#x2705","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2019-11-25T10:36:57+00:00","article_modified_time":"2021-06-02T13:28:28+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg","type":"image\/jpeg"}],"author":"Richard van Hooijdonk","twitter_card":"summary_large_image","twitter_creator":"@rvhooijdonk","twitter_misc":{"Written by":"Richard van Hooijdonk","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/"},"author":{"name":"Richard van Hooijdonk","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/857ccc53beb99d16a67dd4142cc93695"},"headline":"The race is on to protect trains, planes, and ships from devastating cyber-attacks","datePublished":"2019-11-25T10:36:57+00:00","dateModified":"2021-06-02T13:28:28+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/"},"wordCount":1999,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg","keywords":["aviation industry","cybersecurity","ships"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/","name":"The race is on to protect trains, planes, and ships from devastating cyber-attacks - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg","datePublished":"2019-11-25T10:36:57+00:00","dateModified":"2021-06-02T13:28:28+00:00","description":"The growing adoption of new technologies is making the transportation sector increasingly vulnerable to devastating cyber-attacks. &#x2705","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/11\/Transportation-cyber-security.jpg","width":800,"height":526,"caption":"A person wearing a hoodie with their face hidden and holding a laptop surrounded by airplane icons"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/the-race-is-on-to-protect-trains-planes-and-ships-from-devastating-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"The race is on to protect trains, planes, and ships from devastating cyber-attacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/857ccc53beb99d16a67dd4142cc93695","name":"Richard van Hooijdonk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3e68065c92e0390542ecf8612a63ee6061111042e9810075c14580de5f1d526?s=96&d=mm&r=g","caption":"Richard van Hooijdonk"},"sameAs":["https:\/\/x.com\/rvhooijdonk"]}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/65595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=65595"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/65595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/65597"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=65595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=65595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=65595"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=65595"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=65595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}